Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy‐preserving Biometric authentication: challenges and directions
An emerging direction for authenticating people is the adoption of biometric authentication
systems. Biometric credentials are becoming increasingly popular as a means of …
systems. Biometric credentials are becoming increasingly popular as a means of …
Secure and efficient protocols for iris and fingerprint identification
Recent advances in biometric recognition and the increasing use of biometric data prompt
significant privacy challenges associated with the possible misuse, loss, or theft of biometric …
significant privacy challenges associated with the possible misuse, loss, or theft of biometric …
A private and reliable recommendation system for social networks
TR Hoens, M Blanton… - 2010 IEEE Second …, 2010 - ieeexplore.ieee.org
With the proliferation of internet-based social networks into our lives, new mechanisms to
control the release and use of personal data are required. As a step toward this goal, we …
control the release and use of personal data are required. As a step toward this goal, we …
Map** biometrics to a unique key
A Malpani, R Varadarajan - US Patent 9,165,130, 2015 - Google Patents
US9165130B2 - Map** biometrics to a unique key - Google Patents US9165130B2 - Map**
biometrics to a unique key - Google Patents Map** biometrics to a unique key Download PDF …
biometrics to a unique key - Google Patents Map** biometrics to a unique key Download PDF …
A lightweight privacy-aware continuous authentication protocol-paca
As many vulnerabilities of one-time authentication systems have already been uncovered,
there is a growing need and trend to adopt continuous authentication systems. Biometrics …
there is a growing need and trend to adopt continuous authentication systems. Biometrics …
Biometric-based non-transferable anonymous credentials
M Blanton, WMP Hudelson - … , ICICS 2009, Bei**g, China, December 14-17 …, 2009 - Springer
This work explores the problem of using biometric data to achieve non-transferability of
anonymous credentials; that is, sharing of anonymous credentials, which allow one to …
anonymous credentials; that is, sharing of anonymous credentials, which allow one to …
Secure and verifiable outsourcing of large-scale biometric computations
M Blanton, Y Zhang, KB Frikken - ACM Transactions on Information and …, 2013 - dl.acm.org
Cloud computing services are becoming more prevalent and readily available today,
bringing to us economies of scale and making large-scale computation feasible. Security …
bringing to us economies of scale and making large-scale computation feasible. Security …
Secure authentication mechanism using quick response codes
S Sadacharam, R Viswanathan - US Patent 9,300,658, 2016 - Google Patents
BACKGROUND The present invention relates to authentication ofuser iden tity, and more
specifically to secure authentication of a user's identity through quick response (QR) codes …
specifically to secure authentication of a user's identity through quick response (QR) codes …
Linear round bit-decomposition of secret-shared values
T Veugen - IEEE Transactions on Information Forensics and …, 2014 - ieeexplore.ieee.org
In the field of signal processing in the encrypted domain, linear operations are usually easy
to perform, whereas multiplications, and bitwise operations like comparison, are more costly …
to perform, whereas multiplications, and bitwise operations like comparison, are more costly …
Secure authentication mechanism using quick response codes
S Sadacharam, R Viswanathan - US Patent 9,659,163, 2017 - Google Patents
(57) ABSTRACT A method of securing authentication of a user's identity is disclosed. The
method comprises the steps of an authenti cation program of an entity receiving initiation of …
method comprises the steps of an authenti cation program of an entity receiving initiation of …